Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Tackling IoT Security from the Inside Out (Presented by Trusted Computing Group)

    Sponsor Speaker:
    Location:  Interop ITX Theater
    Format: Interop Theater Session
    Track: Security
    Pass Type: All Access, Conference, Summits & Workshops, Business Hall, Wednesday Conference, Thursday Conference, Open to All - Get your pass now!
    Vault Recording: TBD

    IoT security is the top concern for companies implementing IoT strategies. Connecting endpoints and gateways securely to industrial clouds, analytics platforms and other devices can be complicated. Most approaches to IoT security are leveraging more traditional layered security models to detect and respond to threats. Because IoT devices, such as sensors, actuators and controllers, have limited processing power, memory and storage, implementing security down to the device level has been challenging. In this session, you'll learn about how security is being deployed in tiny footprints on IoT devices to enable them to handle authentication and encryption from the device itself. You'll also learn about how to lock down the pre-boot process and ensure authenticated firmware updates to IoT devices. Finally, the session will also review how companies are implementing the Trusted Computing Group's Trusted Platform Module standard to tie device integrity to hardware-based root of trust.